Documentation Index
Fetch the complete documentation index at: https://docs.xloud.tech/llms.txt
Use this file to discover all available pages before exploring further.
Overview
XSDS security encompasses encryption at rest for stored data, cluster authentication between all services using cephx, network isolation to separate replication traffic from client-facing traffic, and regular key rotation procedures.Prerequisites
- Administrator credentials with the
adminrole - Access to XDeploy (
https://connect.<your-domain>) for OSD deployment settings - SSH access to cluster management node for cephx key operations
Encryption at Rest
XSDS supports OSD-level encryption at rest using dm-crypt. All data written to an encrypted OSD is encrypted before it reaches the physical disk.- Enable Encryption
- Key Management
Encryption is configured at OSD deployment time through XDeploy.
Configure encryption before deployment
Navigate to XDeploy → Storage → OSD Deployment and enable
Encrypt OSDs at deployment before provisioning new OSDs.Encryption keys are managed by the Xloud Key Management service and rotated
on a configurable schedule.
Cluster Authentication (cephx)
All cluster communication uses cephx, the XSDS cluster authentication framework. Each service has its own key with minimum required capabilities.- View and Inspect Keys
- Key Rotation
- Least Privilege Caps
List all cephx keys
View capabilities for a specific key
client.admin— full administrative accessclient.cinder— used by the block storage serviceclient.glance— used by the image serviceclient.nova— used by the compute serviceclient.rgw.<id>— used by object storage gateways
Network Isolation
Configure a dedicated cluster network for OSD replication traffic to isolate storage replication I/O from client-facing traffic.| Network | Purpose | Traffic |
|---|---|---|
| Public network | Client-to-OSD I/O, MON communication, RGW API | Read/write requests from Compute nodes |
| Cluster network | OSD-to-OSD replication, recovery, scrubbing | Internal replication traffic |
- Recommended Setup
- Verify Network Config
Separate physical interfaces or VLANs are recommended for high-throughput
production environments:
- Public network: 10 GbE or 25 GbE, shared with compute nodes
- Cluster network: 25 GbE or faster, storage-only VLAN
Next Steps
Encryption at Rest
Block storage volume-level encryption managed through the Key Management service
Xloud Key Management
Manage and rotate the encryption keys used by XSDS and other services
Cluster Management
Ongoing operational management for a secured cluster
Troubleshooting
Diagnose authentication and connectivity issues